Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 03:32
Behavioral task
behavioral1
Sample
97013553d493328e9d849e66cfcfe545.exe
Resource
win7-20220901-en
General
-
Target
97013553d493328e9d849e66cfcfe545.exe
-
Size
468KB
-
MD5
97013553d493328e9d849e66cfcfe545
-
SHA1
4ea16b04a3cab52c5b45a32393a1b8fe975fa44b
-
SHA256
8ac1ca933b6fb64c3fc714d4a8ef7b7f0c7825ad8069d024cbc7d12679c6fdee
-
SHA512
303d2ea8044ae9789f51ad91e4a426f230ff3b47dcbce9f7a0b1c668a8cb996714400023e7b04b56fc3ed8d8656bd1063ae7f4f4beb7ed2abc4bf7dd2e1e460c
-
SSDEEP
3072:pt2faafm33sR10KAOymCq+++XqhNHHecedZ4648zhj7TF1ZEh061EoIOMpkVnRPq:p2ansRcOyYT+XITe3464slnz6hZWOV
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
97013553d493328e9d849e66cfcfe545.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 97013553d493328e9d849e66cfcfe545.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
97013553d493328e9d849e66cfcfe545.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 97013553d493328e9d849e66cfcfe545.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 40 IoCs
Processes:
97013553d493328e9d849e66cfcfe545.exedescription pid process Token: SeImpersonatePrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeTcbPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeChangeNotifyPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeCreateTokenPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeBackupPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeRestorePrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeIncreaseQuotaPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeAssignPrimaryTokenPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeImpersonatePrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeTcbPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeChangeNotifyPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeCreateTokenPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeBackupPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeRestorePrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeIncreaseQuotaPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeAssignPrimaryTokenPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeImpersonatePrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeTcbPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeChangeNotifyPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeCreateTokenPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeBackupPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeRestorePrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeIncreaseQuotaPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeAssignPrimaryTokenPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeImpersonatePrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeTcbPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeChangeNotifyPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeCreateTokenPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeBackupPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeRestorePrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeIncreaseQuotaPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeAssignPrimaryTokenPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeImpersonatePrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeTcbPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeChangeNotifyPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeCreateTokenPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeBackupPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeRestorePrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeIncreaseQuotaPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe Token: SeAssignPrimaryTokenPrivilege 1632 97013553d493328e9d849e66cfcfe545.exe -
outlook_win_path 1 IoCs
Processes:
97013553d493328e9d849e66cfcfe545.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 97013553d493328e9d849e66cfcfe545.exe